CVE-2025-53112: CWE-284: Improper Access Control in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 9.1.0 through 10.0.18, a lack of permission checks can result in unauthorized removal of some specific resources. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53112 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management tool widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 9.1.0 through 10.0.18 of GLPI and is caused by improper access control (CWE-284) and insufficient authorization checks (CWE-862). Specifically, the flaw allows users with limited privileges (requiring at least some level of authentication) to remove certain specific resources without proper permission verification. This unauthorized removal could lead to integrity issues within the system, as critical assets or configurations might be deleted by users who should not have such rights. The vulnerability does not impact confidentiality or availability directly, nor does it require user interaction beyond authentication. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low complexity and requiring privileges but no user interaction, resulting in integrity loss only. The issue was publicly disclosed on July 30, 2025, and fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The vulnerability highlights the importance of strict permission checks in IT management platforms that handle sensitive asset and configuration data.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on their reliance on GLPI for IT asset management and service desk operations. Unauthorized removal of resources could disrupt IT service management workflows, cause loss or corruption of asset tracking data, and potentially lead to mismanagement of licenses or software audits. This can degrade operational efficiency and increase risk exposure due to inaccurate asset inventories. While the vulnerability does not directly expose sensitive data or cause system downtime, the integrity compromise could indirectly affect compliance with regulatory frameworks such as GDPR if asset or license records are altered or deleted improperly. Organizations with complex IT environments or those managing critical infrastructure may face increased operational risks. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks exploiting this flaw.
Mitigation Recommendations
European organizations using GLPI should promptly upgrade to version 10.0.19 or later, where this vulnerability is fixed. Until the upgrade is applied, administrators should review and tighten user permissions, ensuring that only trusted and necessary users have rights to remove resources. Implementing strict role-based access control (RBAC) policies and regularly auditing permission assignments can reduce the risk of unauthorized actions. Additionally, monitoring logs for unusual deletion activities and enabling alerting on such events can provide early detection of exploitation attempts. Organizations should also consider isolating GLPI instances within secure network segments and enforcing multi-factor authentication (MFA) for administrative access to further reduce risk. Regular backups of GLPI data should be maintained to enable recovery in case of unauthorized deletions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden
CVE-2025-53112: CWE-284: Improper Access Control in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 9.1.0 through 10.0.18, a lack of permission checks can result in unauthorized removal of some specific resources. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53112 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management tool widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 9.1.0 through 10.0.18 of GLPI and is caused by improper access control (CWE-284) and insufficient authorization checks (CWE-862). Specifically, the flaw allows users with limited privileges (requiring at least some level of authentication) to remove certain specific resources without proper permission verification. This unauthorized removal could lead to integrity issues within the system, as critical assets or configurations might be deleted by users who should not have such rights. The vulnerability does not impact confidentiality or availability directly, nor does it require user interaction beyond authentication. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low complexity and requiring privileges but no user interaction, resulting in integrity loss only. The issue was publicly disclosed on July 30, 2025, and fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The vulnerability highlights the importance of strict permission checks in IT management platforms that handle sensitive asset and configuration data.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on their reliance on GLPI for IT asset management and service desk operations. Unauthorized removal of resources could disrupt IT service management workflows, cause loss or corruption of asset tracking data, and potentially lead to mismanagement of licenses or software audits. This can degrade operational efficiency and increase risk exposure due to inaccurate asset inventories. While the vulnerability does not directly expose sensitive data or cause system downtime, the integrity compromise could indirectly affect compliance with regulatory frameworks such as GDPR if asset or license records are altered or deleted improperly. Organizations with complex IT environments or those managing critical infrastructure may face increased operational risks. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks exploiting this flaw.
Mitigation Recommendations
European organizations using GLPI should promptly upgrade to version 10.0.19 or later, where this vulnerability is fixed. Until the upgrade is applied, administrators should review and tighten user permissions, ensuring that only trusted and necessary users have rights to remove resources. Implementing strict role-based access control (RBAC) policies and regularly auditing permission assignments can reduce the risk of unauthorized actions. Additionally, monitoring logs for unusual deletion activities and enabling alerting on such events can provide early detection of exploitation attempts. Organizations should also consider isolating GLPI instances within secure network segments and enforcing multi-factor authentication (MFA) for administrative access to further reduce risk. Regular backups of GLPI data should be maintained to enable recovery in case of unauthorized deletions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.087Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699ae
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 7/30/2025, 2:48:30 PM
Last updated: 7/31/2025, 12:34:31 AM
Views: 5
Related Threats
CVE-2025-8344: Unrestricted Upload in openviglet shio
MediumCVE-2025-8343: Path Traversal in openviglet shio
MediumCVE-2025-8340: Cross Site Scripting in code-projects Intern Membership Management System
MediumCVE-2025-8339: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-8336: SQL Injection in Campcodes Online Recruitment Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.